2017-09-21 15:20:06 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Network Working Group A. Dulaunoy
|
|
|
|
|
Internet-Draft A. Iklody
|
|
|
|
|
Intended status: Informational CIRCL
|
2018-04-10 21:49:43 +02:00
|
|
|
|
Expires: October 12, 2018 April 10, 2018
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
MISP object template format
|
|
|
|
|
draft-dulaunoy-misp-object-template-format
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
|
|
|
|
Abstract
|
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
This document describes the MISP object template format which
|
|
|
|
|
describes a simple JSON format to represent the various templates
|
|
|
|
|
used to construct MISP objects. A public directory of common
|
|
|
|
|
vocabularies MISP object templates [MISP-O] is available and relies
|
|
|
|
|
on the MISP object reference format.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
|
|
|
|
Status of This Memo
|
|
|
|
|
|
|
|
|
|
This Internet-Draft is submitted in full conformance with the
|
|
|
|
|
provisions of BCP 78 and BCP 79.
|
|
|
|
|
|
|
|
|
|
Internet-Drafts are working documents of the Internet Engineering
|
|
|
|
|
Task Force (IETF). Note that other groups may also distribute
|
|
|
|
|
working documents as Internet-Drafts. The list of current Internet-
|
2019-06-23 16:24:35 +02:00
|
|
|
|
Drafts is at https://datatracker.ietf.org/drafts/current/.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
|
|
|
|
Internet-Drafts are draft documents valid for a maximum of six months
|
|
|
|
|
and may be updated, replaced, or obsoleted by other documents at any
|
|
|
|
|
time. It is inappropriate to use Internet-Drafts as reference
|
|
|
|
|
material or to cite them other than as "work in progress."
|
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
This Internet-Draft will expire on October 12, 2018.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
|
|
|
|
Copyright Notice
|
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
Copyright (c) 2018 IETF Trust and the persons identified as the
|
2017-09-21 15:20:06 +02:00
|
|
|
|
document authors. All rights reserved.
|
|
|
|
|
|
|
|
|
|
This document is subject to BCP 78 and the IETF Trust's Legal
|
|
|
|
|
Provisions Relating to IETF Documents
|
2019-06-23 16:24:35 +02:00
|
|
|
|
(https://trustee.ietf.org/license-info) in effect on the date of
|
2017-09-21 15:20:06 +02:00
|
|
|
|
publication of this document. Please review these documents
|
|
|
|
|
carefully, as they describe your rights and restrictions with respect
|
|
|
|
|
to this document. Code Components extracted from this document must
|
|
|
|
|
include Simplified BSD License text as described in Section 4.e of
|
2017-09-21 15:44:15 +02:00
|
|
|
|
the Trust Legal Provisions and are provided without warranty as
|
|
|
|
|
described in the Simplified BSD License.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
Dulaunoy & Iklody Expires October 12, 2018 [Page 1]
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
Internet-Draft MISP object template format April 2018
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Table of Contents
|
|
|
|
|
|
|
|
|
|
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
|
2017-09-21 15:44:15 +02:00
|
|
|
|
1.1. Conventions and Terminology . . . . . . . . . . . . . . . 2
|
2017-09-21 15:20:06 +02:00
|
|
|
|
2. Format . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
|
|
|
|
|
2.1. Overview . . . . . . . . . . . . . . . . . . . . . . . . 3
|
2017-09-21 15:44:15 +02:00
|
|
|
|
2.1.1. Object Template . . . . . . . . . . . . . . . . . . . 3
|
|
|
|
|
2.1.2. attributes . . . . . . . . . . . . . . . . . . . . . 4
|
2018-04-10 21:49:43 +02:00
|
|
|
|
2.1.3. Sample Object Template object . . . . . . . . . . . . 6
|
|
|
|
|
2.1.4. Object Relationships . . . . . . . . . . . . . . . . 9
|
|
|
|
|
3. Directory . . . . . . . . . . . . . . . . . . . . . . . . . . 10
|
2019-06-23 16:24:35 +02:00
|
|
|
|
3.1. Existing and public MISP object templates . . . . . . . . 10
|
|
|
|
|
4. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 18
|
|
|
|
|
5. References . . . . . . . . . . . . . . . . . . . . . . . . . 18
|
|
|
|
|
5.1. Normative References . . . . . . . . . . . . . . . . . . 18
|
|
|
|
|
5.2. Informative References . . . . . . . . . . . . . . . . . 18
|
|
|
|
|
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 19
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
|
|
|
|
1. Introduction
|
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
Due to the increased maturity of threat information sharing, the need
|
|
|
|
|
arose for more complex and exhaustive data-points to be shared across
|
|
|
|
|
the various sharing communities. MISP's information sharing in
|
|
|
|
|
general relied on a flat structure of attributes contained within an
|
|
|
|
|
event, where attributes served as atomic secluded data-points with
|
|
|
|
|
some commonalities as defined by the encapsulating event. However,
|
|
|
|
|
this flat structure restricted the use of more diverse and complex
|
|
|
|
|
data-points described by a list of atomic values, a problem solved by
|
|
|
|
|
the MISP object structure.
|
|
|
|
|
|
|
|
|
|
MISP objects combine a list of attributes to represent a singular
|
|
|
|
|
object with various facets. In order to bootstrap the object
|
|
|
|
|
creation process and to maintain uniformity among objects describing
|
|
|
|
|
similar data-points, the MISP object template format serves as a
|
|
|
|
|
reusable and share-able blueprint format.
|
|
|
|
|
|
|
|
|
|
MISP object templates also include a vocabulary to describe the
|
|
|
|
|
various inter object and object to attribute relationships and are
|
|
|
|
|
leveraged by MISP object references.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
1.1. Conventions and Terminology
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
|
|
|
|
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
|
|
|
|
|
document are to be interpreted as described in RFC 2119 [RFC2119].
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
Dulaunoy & Iklody Expires October 12, 2018 [Page 2]
|
2017-09-21 15:44:15 +02:00
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
Internet-Draft MISP object template format April 2018
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
2. Format
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
MISP object templates are composed of the MISP object template (MUST)
|
|
|
|
|
structure itself and a list of MISP object template elements (SHOULD)
|
|
|
|
|
describing the list of possible attributes belonging to the resulting
|
|
|
|
|
object, along with their context and settings.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
MISP object templates themselves consist of a name (MUST), a meta-
|
|
|
|
|
category (MUST) and a description (SHOULD). They are identified by a
|
2019-06-23 16:24:35 +02:00
|
|
|
|
uuid (MUST) and a version (MUST). For any updates or transfer of the
|
|
|
|
|
same object reference. UUID version 4 is RECOMMENDED when assigning
|
|
|
|
|
it to a new object reference. The list of requirements when it comes
|
|
|
|
|
to the contained MISP object template elements is defined in the
|
|
|
|
|
requirements field (OPTIONAL).
|
|
|
|
|
|
|
|
|
|
MISP object template elements consist of an object_relation (MUST), a
|
|
|
|
|
type (MUST), an object_template_id (SHOULD), a ui_priority (SHOULD),
|
|
|
|
|
a list of categories (MAY), a list of sane_default values (MAY) or a
|
2018-04-10 21:49:43 +02:00
|
|
|
|
values_list (MAY).
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
|
|
|
|
2.1. Overview
|
|
|
|
|
|
2019-06-23 17:20:09 +02:00
|
|
|
|
The MISP object template format uses the JSON [RFC8259] format. Each
|
2017-09-21 15:44:15 +02:00
|
|
|
|
template is represented as a JSON object with meta information
|
|
|
|
|
including the following fields: uuid, requiredOneOf, description,
|
|
|
|
|
version, meta-category, name.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
2.1.1. Object Template
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
2.1.1.1. uuid
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
uuid represents the Universally Unique IDentifier (UUID) [RFC4122] of
|
|
|
|
|
the object template. The uuid MUST be preserved for to keep
|
|
|
|
|
consistency of the templates across instances. UUID version 4 is
|
|
|
|
|
RECOMMENDED when assigning it to a new object template.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
uuid is represented as a JSON string. uuid MUST be present.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
2.1.1.2. requiredOneOf
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
requiredOneOf is represented as a JSON list and contains a list of
|
|
|
|
|
attribute relationships of which one must be present in the object to
|
|
|
|
|
be created based on the given template. The requiredOneOf field MAY
|
|
|
|
|
be present.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
|
2019-06-23 16:24:35 +02:00
|
|
|
|
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
Dulaunoy & Iklody Expires October 12, 2018 [Page 3]
|
2017-09-21 15:44:15 +02:00
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
Internet-Draft MISP object template format April 2018
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
|
|
|
|
|
2019-06-23 16:24:35 +02:00
|
|
|
|
2.1.1.3. required
|
|
|
|
|
|
|
|
|
|
required is represented as a JSON list and contains a list of
|
|
|
|
|
attribute relationships of which all must be present in the object to
|
2017-09-21 15:44:15 +02:00
|
|
|
|
be created based on the given template. The required field MAY be
|
|
|
|
|
present.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
2.1.1.4. description
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
description is represented as a JSON string and contains the assigned
|
|
|
|
|
meaning given to objects created using this template. The
|
|
|
|
|
description field MUST be present.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
2.1.1.5. version
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
version represents a numeric incrementing version of the object
|
|
|
|
|
template. It is used to associate the object to the correct version
|
|
|
|
|
of the template and together with the uuid field forms an association
|
|
|
|
|
to the correct template type and version.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
version is represented as a JSON string. version MUST be present.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
2.1.1.6. meta-category
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
meta-category represents the sub-category of objects that the given
|
|
|
|
|
object template belongs to. meta-categories are not tied to a fixed
|
|
|
|
|
list of options but can be created on the fly.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
meta-category is represented as a JSON string. meta-category MUST be
|
2019-06-23 16:24:35 +02:00
|
|
|
|
present.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
2.1.1.7. name
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
name represents the human-readable name of the objects created using
|
|
|
|
|
the given template, describing the intent of the object package.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
name is represented as a JSON string. name MUST be present
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
2.1.2. attributes
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
attributes is represented as a JSON list and contains a list of
|
|
|
|
|
template elements used as a template for creating the individual
|
|
|
|
|
attributes within the object that is to be created with the object.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
attributes is represented as a JSON list. attributes MUST be present.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
Dulaunoy & Iklody Expires October 12, 2018 [Page 4]
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
Internet-Draft MISP object template format April 2018
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
|
|
|
|
|
2019-06-23 16:24:35 +02:00
|
|
|
|
2.1.2.1. description
|
|
|
|
|
|
|
|
|
|
description is represented as a JSON string and contains the
|
|
|
|
|
description of the given attribute in the context of the object with
|
|
|
|
|
the given relationship. The description field MUST be present.
|
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
2.1.2.2. ui-priority
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
ui-priority is represented by a numeric values in JSON string format
|
|
|
|
|
and is meant to provide a priority for the given element in the
|
|
|
|
|
object template visualisation. The ui-priority MAY be present.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
2.1.2.3. misp-attribute
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
misp-attribute is represented by a JSON string or a JSON object with
|
|
|
|
|
a list of values. The value(s) are taken from the pool of types
|
|
|
|
|
defined by the MISP core format's Attribute Object's type list. type
|
|
|
|
|
can contain a JSON object with a list of suggested value alternatives
|
|
|
|
|
encapsulated in a list within a sane_default key or a list of
|
|
|
|
|
enforced value alternatives encapsulated in a list_values key.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
The misp-attribute field MUST be present.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
2.1.2.4. disable_correlation
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
disable_correlation is represented by a JSON boolean. The
|
|
|
|
|
disable_correlation field flags the attribute(s) created by the given
|
|
|
|
|
object template element to be marked as non correlating.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
The misp-attribute field MAY be present.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
2.1.2.5. categories
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
categories is represented by a JSON list containing one or several
|
|
|
|
|
valid options from the list of verbs valid for the category field in
|
|
|
|
|
the Attribute object within the MISP core format.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
The categories field MAY be present.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
2.1.2.6. multiple
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
multiple is represented by a JSON boolean value. It marks the MISP
|
|
|
|
|
object template element as a multiple input field, allowing for
|
|
|
|
|
several attributes to be created by the element within the same
|
|
|
|
|
object.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
The multiple field MAY be present.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Dulaunoy & Iklody Expires October 12, 2018 [Page 5]
|
|
|
|
|
|
|
|
|
|
Internet-Draft MISP object template format April 2018
|
|
|
|
|
|
|
|
|
|
|
2019-06-23 16:24:35 +02:00
|
|
|
|
2.1.2.7. sane_default
|
|
|
|
|
|
|
|
|
|
sane_default is represented by a JSON list containing one or several
|
|
|
|
|
recommended/sane values for an attribute. sane_default is mutually
|
|
|
|
|
exclusive with values_list.
|
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
The sane_default field MAY be present.
|
|
|
|
|
|
|
|
|
|
2.1.2.8. values_list
|
|
|
|
|
|
|
|
|
|
values_list is represented by a JSON List containing one or several
|
|
|
|
|
of fixed values for an attribute. values_list is mutually exclusive
|
|
|
|
|
with sane_default.
|
|
|
|
|
|
|
|
|
|
The value_list field MAY be present.
|
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
2.1.3. Sample Object Template object
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
The MISP object template directory is publicly available [MISP-O] in
|
|
|
|
|
a git repository and contains more than 60 object templates. As
|
|
|
|
|
illustration, two sample objects templates are included.
|
|
|
|
|
|
|
|
|
|
2.1.3.1. credit-card object template
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Dulaunoy & Iklody Expires October 12, 2018 [Page 6]
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
Internet-Draft MISP object template format April 2018
|
2017-09-21 15:44:15 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
{
|
|
|
|
|
"requiredOneOf": [
|
|
|
|
|
"cc-number"
|
|
|
|
|
],
|
|
|
|
|
"attributes": {
|
|
|
|
|
"version": {
|
2017-09-21 15:59:55 +02:00
|
|
|
|
"description": "Version of the card.",
|
2017-09-21 15:44:15 +02:00
|
|
|
|
"ui-priority": 0,
|
2017-09-21 15:59:55 +02:00
|
|
|
|
"misp-attribute": "text"
|
2017-09-21 15:44:15 +02:00
|
|
|
|
},
|
|
|
|
|
"comment": {
|
|
|
|
|
"description": "A description of the card.",
|
|
|
|
|
"ui-priority": 0,
|
|
|
|
|
"misp-attribute": "comment"
|
|
|
|
|
},
|
|
|
|
|
"card-security-code": {
|
2017-09-21 15:59:55 +02:00
|
|
|
|
"description": "Card security code (CSC, CVD, CVV, CVC and SPC) as embossed or printed on the card.",
|
2017-09-21 15:44:15 +02:00
|
|
|
|
"ui-priority": 0,
|
|
|
|
|
"misp-attribute": "text"
|
|
|
|
|
},
|
|
|
|
|
"name": {
|
|
|
|
|
"description": "Name of the card owner.",
|
|
|
|
|
"ui-priority": 0,
|
|
|
|
|
"misp-attribute": "text"
|
|
|
|
|
},
|
|
|
|
|
"issued": {
|
|
|
|
|
"description": "Initial date of validity or issued date.",
|
|
|
|
|
"ui-priority": 0,
|
|
|
|
|
"misp-attribute": "datetime"
|
|
|
|
|
},
|
|
|
|
|
"expiration": {
|
|
|
|
|
"description": "Maximum date of validity",
|
|
|
|
|
"ui-priority": 0,
|
|
|
|
|
"misp-attribute": "datetime"
|
|
|
|
|
},
|
|
|
|
|
"cc-number": {
|
|
|
|
|
"description": "credit-card number as encoded on the card.",
|
|
|
|
|
"ui-priority": 0,
|
|
|
|
|
"misp-attribute": "cc-number"
|
|
|
|
|
}
|
2017-09-21 15:59:55 +02:00
|
|
|
|
},
|
|
|
|
|
"version": 2,
|
|
|
|
|
"description": "A payment card like credit card, debit card or any similar cards which can be used for financial transactions.",
|
|
|
|
|
"meta-category": "financial",
|
|
|
|
|
"uuid": "2b9c57aa-daba-4330-a738-56f18743b0c7",
|
|
|
|
|
"name": "credit-card"
|
2017-09-21 15:44:15 +02:00
|
|
|
|
}
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
Dulaunoy & Iklody Expires October 12, 2018 [Page 7]
|
2017-09-21 15:44:15 +02:00
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
Internet-Draft MISP object template format April 2018
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2.1.3.2. credential object template
|
|
|
|
|
|
|
|
|
|
{
|
|
|
|
|
"requiredOneOf": [
|
|
|
|
|
"password"
|
|
|
|
|
],
|
|
|
|
|
"attributes": {
|
|
|
|
|
"text": {
|
|
|
|
|
"description": "A description of the credential(s)",
|
|
|
|
|
"disable_correlation": true,
|
|
|
|
|
"ui-priority": 1,
|
|
|
|
|
"misp-attribute": "text"
|
|
|
|
|
},
|
|
|
|
|
"username": {
|
|
|
|
|
"description": "Username related to the password(s)",
|
|
|
|
|
"ui-priority": 1,
|
|
|
|
|
"misp-attribute": "text"
|
|
|
|
|
},
|
|
|
|
|
"password": {
|
|
|
|
|
"description": "Password",
|
|
|
|
|
"multiple": true,
|
|
|
|
|
"ui-priority": 1,
|
|
|
|
|
"misp-attribute": "text"
|
|
|
|
|
},
|
|
|
|
|
"type": {
|
|
|
|
|
"description": "Type of password(s)",
|
|
|
|
|
"ui-priority": 1,
|
|
|
|
|
"misp-attribute": "text",
|
|
|
|
|
"values_list": [
|
|
|
|
|
"password",
|
|
|
|
|
"api-key",
|
|
|
|
|
"encryption-key",
|
|
|
|
|
"unknown"
|
|
|
|
|
]
|
|
|
|
|
},
|
|
|
|
|
"origin": {
|
|
|
|
|
"description": "Origin of the credential(s)",
|
|
|
|
|
"ui-priority": 1,
|
|
|
|
|
"misp-attribute": "text",
|
|
|
|
|
"sane_default": [
|
|
|
|
|
"bruteforce-scanning",
|
|
|
|
|
"malware-analysis",
|
|
|
|
|
"memory-analysis",
|
|
|
|
|
"network-analysis",
|
|
|
|
|
"leak",
|
|
|
|
|
"unknown"
|
|
|
|
|
]
|
|
|
|
|
},
|
|
|
|
|
|
|
|
|
|
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
Dulaunoy & Iklody Expires October 12, 2018 [Page 8]
|
|
|
|
|
|
|
|
|
|
Internet-Draft MISP object template format April 2018
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
"format": {
|
|
|
|
|
"description": "Format of the password(s)",
|
|
|
|
|
"ui-priority": 1,
|
|
|
|
|
"misp-attribute": "text",
|
|
|
|
|
"values_list": [
|
|
|
|
|
"clear-text",
|
|
|
|
|
"hashed",
|
|
|
|
|
"encrypted",
|
|
|
|
|
"unknown"
|
|
|
|
|
]
|
|
|
|
|
},
|
|
|
|
|
"notification": {
|
|
|
|
|
"description": "Mention of any notification(s) towards the potential owner(s) of the credential(s)",
|
|
|
|
|
"ui-priority": 1,
|
|
|
|
|
"misp-attribute": "text",
|
|
|
|
|
"multiple": true,
|
|
|
|
|
"values_list": [
|
|
|
|
|
"victim-notified",
|
|
|
|
|
"service-notified",
|
|
|
|
|
"none"
|
|
|
|
|
]
|
|
|
|
|
}
|
|
|
|
|
},
|
|
|
|
|
"version": 2,
|
|
|
|
|
"description": "Credential describes one or more credential(s) including password(s), api key(s) or decryption key(s).",
|
|
|
|
|
"meta-category": "misc",
|
|
|
|
|
"uuid": "a27e98c9-9b0e-414c-8076-d201e039ca09",
|
|
|
|
|
"name": "credential"
|
|
|
|
|
}
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
2.1.4. Object Relationships
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
2.1.4.1. name
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
name represents the human-readable relationship type which can be
|
|
|
|
|
used when creating MISP object relations.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
name is represented as a JSON string. name MUST be present.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
2.1.4.2. description
|
|
|
|
|
|
|
|
|
|
description is represented as a JSON string and contains the
|
|
|
|
|
description of the object relationship type. The description field
|
|
|
|
|
MUST be present.
|
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Dulaunoy & Iklody Expires October 12, 2018 [Page 9]
|
|
|
|
|
|
|
|
|
|
Internet-Draft MISP object template format April 2018
|
|
|
|
|
|
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
2.1.4.3. format
|
|
|
|
|
|
|
|
|
|
format is represented by a JSON list containing a list of formats
|
|
|
|
|
that the relationship type is valid for and can be mapped to. The
|
2018-04-10 21:49:43 +02:00
|
|
|
|
format field MUST be present.
|
2017-09-21 15:44:15 +02:00
|
|
|
|
|
|
|
|
|
3. Directory
|
|
|
|
|
|
|
|
|
|
The MISP object template directory is publicly available [MISP-O] in
|
|
|
|
|
a git repository. The repository contains an objects directory,
|
|
|
|
|
which contains a directory per object type, containing a file named
|
|
|
|
|
definition.json which contains the definition of the object template
|
|
|
|
|
in the above described format.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
A relationships directory is also included, containing a
|
|
|
|
|
definition.json file which contains a list of MISP object relation
|
2019-06-23 16:24:35 +02:00
|
|
|
|
definitions. There are more than 125 existing templates object
|
|
|
|
|
documented in [MISP-O-DOC].
|
|
|
|
|
|
|
|
|
|
3.1. Existing and public MISP object templates
|
|
|
|
|
|
|
|
|
|
o tsk-chats - An Object Template to gather information from
|
|
|
|
|
evidential or interesting exchange of messages identified during a
|
|
|
|
|
digital forensic investigation.
|
|
|
|
|
|
|
|
|
|
o tsk-web-bookmark - An Object Template to add evidential bookmarks
|
|
|
|
|
identified during a digital forensic investigation.
|
|
|
|
|
|
|
|
|
|
o tsk-web-cookie - An TSK-Autopsy Object Template to represent
|
|
|
|
|
cookies identified during a forensic investigation.
|
|
|
|
|
|
|
|
|
|
o tsk-web-downloads - An Object Template to add web-downloads.
|
|
|
|
|
|
|
|
|
|
o tsk-web-history - An Object Template to share web history
|
|
|
|
|
information.
|
|
|
|
|
|
|
|
|
|
o tsk-web-search-query - An Object Template to share web search
|
|
|
|
|
query information.
|
|
|
|
|
|
|
|
|
|
o ail-leak - An information leak as defined by the AIL Analysis
|
|
|
|
|
Information Leak framework.
|
|
|
|
|
|
|
|
|
|
o ais-info - Automated Indicator Sharing (AIS) Information Source
|
|
|
|
|
Markings.
|
|
|
|
|
|
|
|
|
|
o android-permission - A set of android permissions - one or more
|
|
|
|
|
permission(s) which can be linked to other objects (e.g. malware,
|
|
|
|
|
app).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Dulaunoy & Iklody Expires October 12, 2018 [Page 10]
|
|
|
|
|
|
|
|
|
|
Internet-Draft MISP object template format April 2018
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
o annotation - An annotation object allowing analysts to add
|
|
|
|
|
annotations, comments, executive summary to a MISP event, objects
|
|
|
|
|
or attributes.
|
|
|
|
|
|
|
|
|
|
o anonymisation - Anonymisation object describing an anonymisation
|
|
|
|
|
technique used to encode MISP attribute values. Reference:
|
|
|
|
|
<https://www.caida.org/tools/taxonomy/anonymization.xml>.
|
|
|
|
|
|
|
|
|
|
o asn - Autonomous system object describing an autonomous system
|
|
|
|
|
which can include one or more network operators management an
|
|
|
|
|
entity (e.g. ISP) along with their routing policy, routing
|
|
|
|
|
prefixes or alike.
|
|
|
|
|
|
|
|
|
|
o authenticode-signerinfo - Authenticode Signer Info.
|
|
|
|
|
|
|
|
|
|
o av-signature - Antivirus detection signature.
|
|
|
|
|
|
|
|
|
|
o bank-account - An object describing bank account information based
|
|
|
|
|
on account description from goAML 4.0.
|
|
|
|
|
|
|
|
|
|
o bgp-hijack - Object encapsulating BGP Hijack description as
|
|
|
|
|
specified, for example, by bgpstream.com.
|
|
|
|
|
|
|
|
|
|
o cap-alert - Common Alerting Protocol Version (CAP) alert object.
|
|
|
|
|
|
|
|
|
|
o cap-info - Common Alerting Protocol Version (CAP) info object.
|
|
|
|
|
|
|
|
|
|
o cap-resource - Common Alerting Protocol Version (CAP) resource
|
|
|
|
|
object.
|
|
|
|
|
|
|
|
|
|
o coin-address - An address used in a cryptocurrency.
|
|
|
|
|
|
|
|
|
|
o cookie - An HTTP cookie (web cookie, browser cookie) is a small
|
|
|
|
|
piece of data that a server sends to the user's web browser. The
|
|
|
|
|
browser may store it and send it back with the next request to the
|
|
|
|
|
same server. Typically, it's used to tell if two requests came
|
|
|
|
|
from the same browser -- keeping a user logged-in, for example.
|
|
|
|
|
It remembers stateful information for the stateless HTTP protocol.
|
|
|
|
|
(as defined by the Mozilla foundation.
|
|
|
|
|
|
|
|
|
|
o cortex - Cortex object describing a complete cortex analysis.
|
|
|
|
|
Observables would be attribute with a relationship from this
|
|
|
|
|
object.
|
|
|
|
|
|
|
|
|
|
o cortex-taxonomy - Cortex object describing an Cortex Taxonomy (or
|
|
|
|
|
mini report).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Dulaunoy & Iklody Expires October 12, 2018 [Page 11]
|
|
|
|
|
|
|
|
|
|
Internet-Draft MISP object template format April 2018
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
o course-of-action - An object describing a specific measure taken
|
|
|
|
|
to prevent or respond to an attack.
|
|
|
|
|
|
|
|
|
|
o cowrie - Cowrie honeypot object template.
|
|
|
|
|
|
|
|
|
|
o credential - Credential describes one or more credential(s)
|
|
|
|
|
including password(s), api key(s) or decryption key(s).
|
|
|
|
|
|
|
|
|
|
o credit-card - A payment card like credit card, debit card or any
|
|
|
|
|
similar cards which can be used for financial transactions.
|
|
|
|
|
|
|
|
|
|
o ddos - DDoS object describes a current DDoS activity from a
|
|
|
|
|
specific or/and to a specific target. Type of DDoS can be
|
|
|
|
|
attached to the object as a taxonomy.
|
|
|
|
|
|
|
|
|
|
o device - An object to define a device.
|
|
|
|
|
|
|
|
|
|
o diameter-attack - Attack as seen on diameter authentication
|
|
|
|
|
against a GSM, UMTS or LTE network.
|
|
|
|
|
|
|
|
|
|
o domain-ip - A domain and IP address seen as a tuple in a specific
|
|
|
|
|
time frame.
|
|
|
|
|
|
|
|
|
|
o elf - Object describing a Executable and Linkable Format.
|
|
|
|
|
|
|
|
|
|
o elf-section - Object describing a section of an Executable and
|
|
|
|
|
Linkable Format.
|
|
|
|
|
|
|
|
|
|
o email - Email object describing an email with meta-information.
|
|
|
|
|
|
|
|
|
|
o exploit-poc - Exploit-poc object describing a proof of concept or
|
|
|
|
|
exploit of a vulnerability. This object has often a relationship
|
|
|
|
|
with a vulnerability object.
|
|
|
|
|
|
|
|
|
|
o facial-composite - An object which describes a facial composite.
|
|
|
|
|
|
|
|
|
|
o fail2ban - Fail2ban event.
|
|
|
|
|
|
|
|
|
|
o file - File object describing a file with meta-information.
|
|
|
|
|
|
|
|
|
|
o forensic-case - An object template to describe a digital forensic
|
|
|
|
|
case.
|
|
|
|
|
|
|
|
|
|
o forensic-evidence - An object template to describe a digital
|
|
|
|
|
forensic evidence.
|
|
|
|
|
|
|
|
|
|
o geolocation - An object to describe a geographic location.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Dulaunoy & Iklody Expires October 12, 2018 [Page 12]
|
|
|
|
|
|
|
|
|
|
Internet-Draft MISP object template format April 2018
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
o gtp-attack - GTP attack object as seen on a GSM, UMTS or LTE
|
|
|
|
|
network.
|
|
|
|
|
|
|
|
|
|
o http-request - A single HTTP request header.
|
|
|
|
|
|
|
|
|
|
o ilr-impact - Institut Luxembourgeois de Regulation - Impact.
|
|
|
|
|
|
|
|
|
|
o ilr-notification-incident - Institut Luxembourgeois de Regulation
|
|
|
|
|
- Notification d'incident.
|
|
|
|
|
|
|
|
|
|
o internal-reference - Internal reference.
|
|
|
|
|
|
|
|
|
|
o interpol-notice - An object which describes a Interpol notice.
|
|
|
|
|
|
|
|
|
|
o ip-api-address - IP Address information. Useful if you are
|
|
|
|
|
pulling your ip information from ip-api.com.
|
|
|
|
|
|
|
|
|
|
o ip-port - An IP address (or domain or hostname) and a port seen as
|
|
|
|
|
a tuple (or as a triple) in a specific time frame.
|
|
|
|
|
|
|
|
|
|
o irc - An IRC object to describe an IRC server and the associated
|
|
|
|
|
channels.
|
|
|
|
|
|
|
|
|
|
o ja3 - JA3 is a new technique for creating SSL client fingerprints
|
|
|
|
|
that are easy to produce and can be easily shared for threat
|
|
|
|
|
intelligence. Fingerprints are composed of Client Hello packet;
|
|
|
|
|
SSL Version, Accepted Ciphers, List of Extensions, Elliptic
|
|
|
|
|
Curves, and Elliptic Curve Formats.
|
|
|
|
|
<https://github.com/salesforce/ja3>.
|
|
|
|
|
|
|
|
|
|
o legal-entity - An object to describe a legal entity.
|
|
|
|
|
|
|
|
|
|
o lnk - LNK object describing a Windows LNK binary file (aka Windows
|
|
|
|
|
shortcut).
|
|
|
|
|
|
|
|
|
|
o macho - Object describing a file in Mach-O format.
|
|
|
|
|
|
|
|
|
|
o macho-section - Object describing a section of a file in Mach-O
|
|
|
|
|
format.
|
|
|
|
|
|
|
|
|
|
o mactime-timeline-analysis - Mactime template, used in forensic
|
|
|
|
|
investigations to describe the timeline of a file activity.
|
|
|
|
|
|
|
|
|
|
o malware-config - Malware configuration recovered or extracted from
|
|
|
|
|
a malicious binary.
|
|
|
|
|
|
|
|
|
|
o microblog - Microblog post like a Twitter tweet or a post on a
|
|
|
|
|
Facebook wall.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Dulaunoy & Iklody Expires October 12, 2018 [Page 13]
|
|
|
|
|
|
|
|
|
|
Internet-Draft MISP object template format April 2018
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
o mutex - Object to describe mutual exclusion locks (mutex) as seen
|
|
|
|
|
in memory or computer program.
|
|
|
|
|
|
|
|
|
|
o netflow - Netflow object describes an network object based on the
|
|
|
|
|
Netflowv5/v9 minimal definition.
|
|
|
|
|
|
|
|
|
|
o network-connection - A local or remote network connection.
|
|
|
|
|
|
|
|
|
|
o network-socket - Network socket object describes a local or remote
|
|
|
|
|
network connections based on the socket data structure.
|
|
|
|
|
|
|
|
|
|
o misc - An object which describes an organization.
|
|
|
|
|
|
|
|
|
|
o original-imported-file - Object describing the original file used
|
|
|
|
|
to import data in MISP.
|
|
|
|
|
|
|
|
|
|
o passive-dns - Passive DNS records as expressed in draft-dulaunoy-
|
|
|
|
|
dnsop-passive-dns-cof-01.
|
|
|
|
|
|
|
|
|
|
o paste - Paste or similar post from a website allowing to share
|
|
|
|
|
privately or publicly posts.
|
|
|
|
|
|
|
|
|
|
o pcap-metadata - Network packet capture metadata.
|
|
|
|
|
|
|
|
|
|
o pe - Object describing a Portable Executable.
|
|
|
|
|
|
|
|
|
|
o pe-section - Object describing a section of a Portable Executable.
|
|
|
|
|
|
|
|
|
|
o person - An object which describes a person or an identity.
|
|
|
|
|
|
|
|
|
|
o phishing - Phishing template to describe a phishing website and
|
|
|
|
|
its analysis.
|
|
|
|
|
|
|
|
|
|
o phishing-kit - Object to describe a phishing-kit.
|
|
|
|
|
|
|
|
|
|
o phone - A phone or mobile phone object which describe a phone.
|
|
|
|
|
|
|
|
|
|
o process - Object describing a system process.
|
|
|
|
|
|
|
|
|
|
o python-etvx-event-log - Event log object template to share
|
|
|
|
|
information of the activities conducted on a system. .
|
|
|
|
|
|
|
|
|
|
o r2graphity - Indicators extracted from files using radare2 and
|
|
|
|
|
graphml.
|
|
|
|
|
|
|
|
|
|
o regexp - An object describing a regular expression (regex or
|
|
|
|
|
regexp). The object can be linked via a relationship to other
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Dulaunoy & Iklody Expires October 12, 2018 [Page 14]
|
|
|
|
|
|
|
|
|
|
Internet-Draft MISP object template format April 2018
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
attributes or objects to describe how it can be represented as a
|
|
|
|
|
regular expression.
|
|
|
|
|
|
|
|
|
|
o registry-key - Registry key object describing a Windows registry
|
|
|
|
|
key with value and last-modified timestamp.
|
|
|
|
|
|
|
|
|
|
o regripper-NTUser - Regripper Object template designed to present
|
|
|
|
|
user specific configuration details extracted from the NTUSER.dat
|
|
|
|
|
hive.
|
|
|
|
|
|
|
|
|
|
o regripper-sam-hive-single-user - Regripper Object template
|
|
|
|
|
designed to present user profile details extracted from the SAM
|
|
|
|
|
hive.
|
|
|
|
|
|
|
|
|
|
o regripper-sam-hive-user-group - Regripper Object template designed
|
|
|
|
|
to present group profile details extracted from the SAM hive.
|
|
|
|
|
|
|
|
|
|
o regripper-software-hive-BHO - Regripper Object template designed
|
|
|
|
|
to gather information of the browser helper objects installed on
|
|
|
|
|
the system.
|
|
|
|
|
|
|
|
|
|
o regripper-software-hive-appInit-DLLS - Regripper Object template
|
|
|
|
|
designed to gather information of the DLL files installed on the
|
|
|
|
|
system.
|
|
|
|
|
|
|
|
|
|
o regripper-software-hive-application-paths - Regripper Object
|
|
|
|
|
template designed to gather information of the application paths.
|
|
|
|
|
|
|
|
|
|
o regripper-software-hive-applications-installed - Regripper Object
|
|
|
|
|
template designed to gather information of the applications
|
|
|
|
|
installed on the system.
|
|
|
|
|
|
|
|
|
|
o regripper-software-hive-command-shell - Regripper Object template
|
|
|
|
|
designed to gather information of the shell commands executed on
|
|
|
|
|
the system.
|
|
|
|
|
|
|
|
|
|
o regripper-software-hive-windows-general-info - Regripper Object
|
|
|
|
|
template designed to gather general windows information extracted
|
|
|
|
|
from the software-hive.
|
|
|
|
|
|
|
|
|
|
o regripper-software-hive-software-run - Regripper Object template
|
|
|
|
|
designed to gather information of the applications set to run on
|
|
|
|
|
the system.
|
|
|
|
|
|
|
|
|
|
o regripper-software-hive-userprofile-winlogon - Regripper Object
|
|
|
|
|
template designed to gather user profile information when the user
|
|
|
|
|
logs onto the system, gathered from the software hive.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Dulaunoy & Iklody Expires October 12, 2018 [Page 15]
|
|
|
|
|
|
|
|
|
|
Internet-Draft MISP object template format April 2018
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
o regripper-system-hive-firewall-configuration - Regripper Object
|
|
|
|
|
template designed to present firewall configuration information
|
|
|
|
|
extracted from the system-hive.
|
|
|
|
|
|
|
|
|
|
o regripper-system-hive-general-configuration - Regripper Object
|
|
|
|
|
template designed to present general system properties extracted
|
|
|
|
|
from the system-hive.
|
|
|
|
|
|
|
|
|
|
o regripper-system-hive-network-information. - Regripper object
|
|
|
|
|
template designed to gather network information from the system-
|
|
|
|
|
hive.
|
|
|
|
|
|
|
|
|
|
o regripper-system-hive-services-drivers - Regripper Object template
|
|
|
|
|
designed to gather information regarding the services/drivers from
|
|
|
|
|
the system-hive.
|
|
|
|
|
|
|
|
|
|
o report - Metadata used to generate an executive level report.
|
|
|
|
|
|
|
|
|
|
o research-scanner - Information related to known scanning activity
|
|
|
|
|
(e.g. from research projects).
|
|
|
|
|
|
|
|
|
|
o rogue-dns - Rogue DNS as defined by CERT.br.
|
|
|
|
|
|
|
|
|
|
o rtir - RTIR - Request Tracker for Incident Response.
|
|
|
|
|
|
|
|
|
|
o sandbox-report - Sandbox report.
|
|
|
|
|
|
|
|
|
|
o sb-signature - Sandbox detection signature.
|
|
|
|
|
|
|
|
|
|
o script - Object describing a computer program written to be run in
|
|
|
|
|
a special run-time environment. The script or shell script can be
|
|
|
|
|
used for malicious activities but also as support tools for threat
|
|
|
|
|
analysts.
|
|
|
|
|
|
|
|
|
|
o shell-commands - Object describing a series of shell commands
|
|
|
|
|
executed. This object can be linked with malicious files in order
|
|
|
|
|
to describe a specific execution of shell commands.
|
|
|
|
|
|
|
|
|
|
o short-message-service - Short Message Service (SMS) object
|
|
|
|
|
template describing one or more SMS message. Restriction of the
|
|
|
|
|
initial format 3GPP 23.038 GSM character set doesn't apply.
|
|
|
|
|
|
|
|
|
|
o shortened-link - Shortened link and its redirect target.
|
|
|
|
|
|
|
|
|
|
o splunk - Splunk / Splunk ES object.
|
|
|
|
|
|
|
|
|
|
o ss7-attack - SS7 object of an attack seen on a GSM, UMTS or LTE
|
|
|
|
|
network via SS7 logging.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Dulaunoy & Iklody Expires October 12, 2018 [Page 16]
|
|
|
|
|
|
|
|
|
|
Internet-Draft MISP object template format April 2018
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
o ssh-authorized-keys - An object to store ssh authorized keys file.
|
|
|
|
|
|
|
|
|
|
o stix2-pattern - An object describing a STIX pattern. The object
|
|
|
|
|
can be linked via a relationship to other attributes or objects to
|
|
|
|
|
describe how it can be represented as a STIX pattern.
|
|
|
|
|
|
|
|
|
|
o suricata - An object describing one or more Suricata rule(s) along
|
|
|
|
|
with version and contextual information.
|
|
|
|
|
|
|
|
|
|
o target-system - Description about an targeted system, this could
|
|
|
|
|
potentially be a compromissed internal system.
|
|
|
|
|
|
|
|
|
|
o threatgrid-report - ThreatGrid report.
|
|
|
|
|
|
|
|
|
|
o timecode - Timecode object to describe a start of video sequence
|
|
|
|
|
(e.g. CCTV evidence) and the end of the video sequence.
|
|
|
|
|
|
|
|
|
|
o timesketch-timeline - A timesketch timeline object based on
|
|
|
|
|
mandatory field in timesketch to describe a log entry.
|
|
|
|
|
|
|
|
|
|
o timesketch_message - A timesketch message entry.
|
|
|
|
|
|
|
|
|
|
o timestamp - A generic timestamp object to represent time including
|
|
|
|
|
first time and last time seen. Relationship will then define the
|
|
|
|
|
kind of time relationship.
|
|
|
|
|
|
|
|
|
|
o tor-hiddenservice - Tor hidden service (onion service) object.
|
|
|
|
|
|
|
|
|
|
o tor-node - Tor node (which protects your privacy on the internet
|
|
|
|
|
by hiding the connection between users Internet address and the
|
|
|
|
|
services used by the users) description which are part of the Tor
|
|
|
|
|
network at a time.
|
|
|
|
|
|
|
|
|
|
o tracking-id - Analytics and tracking ID such as used in Google
|
|
|
|
|
Analytics or other analytic platform.
|
|
|
|
|
|
|
|
|
|
o transaction - An object to describe a financial transaction.
|
|
|
|
|
|
|
|
|
|
o url - url object describes an url along with its normalized field
|
|
|
|
|
(like extracted using faup parsing library) and its metadata.
|
|
|
|
|
|
|
|
|
|
o vehicle - Vehicle object template to describe a vehicle
|
|
|
|
|
information and registration.
|
|
|
|
|
|
|
|
|
|
o victim - Victim object describes the target of an attack or abuse.
|
|
|
|
|
|
|
|
|
|
o virustotal-report - VirusTotal report.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Dulaunoy & Iklody Expires October 12, 2018 [Page 17]
|
|
|
|
|
|
|
|
|
|
Internet-Draft MISP object template format April 2018
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
o vulnerability - Vulnerability object describing a common
|
|
|
|
|
vulnerability enumeration which can describe published,
|
|
|
|
|
unpublished, under review or embargo vulnerability for software,
|
|
|
|
|
equipments or hardware.
|
|
|
|
|
|
|
|
|
|
o whois - Whois records information for a domain name or an IP
|
|
|
|
|
address.
|
|
|
|
|
|
|
|
|
|
o x509 - x509 object describing a X.509 certificate.
|
|
|
|
|
|
|
|
|
|
o yabin - yabin.py generates Yara rules from function prologs, for
|
|
|
|
|
matching and hunting binaries. ref: <https://github.com/
|
|
|
|
|
AlienVault-OTX/yabin>.
|
|
|
|
|
|
|
|
|
|
o yara - An object describing a YARA rule along with its version.
|
2017-09-21 15:44:15 +02:00
|
|
|
|
|
|
|
|
|
4. Acknowledgements
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:59:55 +02:00
|
|
|
|
The authors wish to thank all the MISP community who are supporting
|
|
|
|
|
the creation of open standards in threat intelligence sharing.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
5. References
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
5.1. Normative References
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
|
|
|
|
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
|
|
|
|
|
Requirement Levels", BCP 14, RFC 2119,
|
2019-06-23 16:24:35 +02:00
|
|
|
|
DOI 10.17487/RFC2119, March 1997,
|
|
|
|
|
<https://www.rfc-editor.org/info/rfc2119>.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
[RFC4122] Leach, P., Mealling, M., and R. Salz, "A Universally
|
|
|
|
|
Unique IDentifier (UUID) URN Namespace", RFC 4122,
|
2019-06-23 16:24:35 +02:00
|
|
|
|
DOI 10.17487/RFC4122, July 2005,
|
|
|
|
|
<https://www.rfc-editor.org/info/rfc4122>.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2019-06-23 17:20:09 +02:00
|
|
|
|
[RFC8259] Bray, T., Ed., "The JavaScript Object Notation (JSON) Data
|
|
|
|
|
Interchange Format", STD 90, RFC 8259,
|
|
|
|
|
DOI 10.17487/RFC8259, December 2017,
|
|
|
|
|
<https://www.rfc-editor.org/info/rfc8259>.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
5.2. Informative References
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2019-06-23 16:24:35 +02:00
|
|
|
|
[MISP-O] MISP, "MISP Objects - shared and common object templates",
|
|
|
|
|
<https://github.com/MISP/misp-objects>.
|
2017-09-21 15:20:06 +02:00
|
|
|
|
|
2019-06-23 16:24:35 +02:00
|
|
|
|
[MISP-O-DOC]
|
|
|
|
|
"MISP objects directory", 2018,
|
|
|
|
|
<https://www.misp-project.org/objects.html>.
|
2018-04-10 21:49:43 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2019-06-23 16:24:35 +02:00
|
|
|
|
Dulaunoy & Iklody Expires October 12, 2018 [Page 18]
|
2018-04-10 21:49:43 +02:00
|
|
|
|
|
|
|
|
|
Internet-Draft MISP object template format April 2018
|
|
|
|
|
|
|
|
|
|
|
2017-09-21 15:20:06 +02:00
|
|
|
|
Authors' Addresses
|
|
|
|
|
|
|
|
|
|
Alexandre Dulaunoy
|
|
|
|
|
Computer Incident Response Center Luxembourg
|
|
|
|
|
16, bd d'Avranches
|
|
|
|
|
Luxembourg L-1611
|
|
|
|
|
Luxembourg
|
|
|
|
|
|
|
|
|
|
Phone: +352 247 88444
|
|
|
|
|
Email: alexandre.dulaunoy@circl.lu
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Andras Iklody
|
|
|
|
|
Computer Incident Response Center Luxembourg
|
|
|
|
|
16, bd d'Avranches
|
|
|
|
|
Luxembourg L-1611
|
|
|
|
|
Luxembourg
|
|
|
|
|
|
|
|
|
|
Phone: +352 247 88444
|
|
|
|
|
Email: andras.iklody@circl.lu
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2017-09-21 15:44:15 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2018-04-10 21:49:43 +02:00
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2019-06-23 16:24:35 +02:00
|
|
|
|
Dulaunoy & Iklody Expires October 12, 2018 [Page 19]
|